IT Security

The Best Practices for Email Security Webinar

Last week we kicked off our Webinar Series. Modern attacks are rapidly growing in volume and sophistication. All it takes is for one employee to open a single malicious attachment, or click one infected link, and your company’s entire cybersecurity is put at risk. Due to these actions being so simple and common – opening an email, following a link to...

Windows Patching Q & A

Q: On my invoice I now see Managed Server Patching. What is that? Alliance Business Technologies manages the installation of Microsoft updates on your servers and workstations. Microsoft updates are important patches to your operating systems. They ensure stability and safety and keep your IT secure. Systems that are not updated are vulnerable to attacks and...

Securing your Web Site with HTTPS to build trust with your audience.

Chrome web browser is now marking all HTTP sites as "not secure".
                Chrome used to display a neutral information icon, but starting with version 68, the browser will warn users with an extra notification in the address bar. Chrome currently marks HTTPS-encrypted sites with a green lock icon and "Secure" sign. Google has been nudging users away...

The Dangers of Phishing – Help Employees avoid the Cybercrime trap

To help you be more informed and proactively educate your employees on phishing attacks, we have curated this blog and e-book. In this blog and e-book you will learn the most common types of phishing attacks, how to spot them, tips to protect your company and educate your employees.

What is Phishing?

Phishing is...

Disaster Recovery: Why Define your RPO and RTO

While it is nearly impossible to predict what the next disaster will be, it is easy to prepare for, especially if you have an effective business continuity plan. The first step towards having a secure and available business environment is determining your Recovery Point Objective (RPO) and Recovery Time Objective (RTO). RPO and RTO are both essential...

Notifiable Data Breaches Scheme

A consolidated guide about the Data breach preparation and response — The OAIC has released a guide titled Data breach preparation and response — A guide to managing data breaches in accordance with the Privacy Act 1988 (Cth) (Privacy Act). Find this guide here. This guide consolidates the information provided in the Data breach...